Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-7329: CWE-306 Missing Authentication for Critical Function in tinycontrol Lan Controller

0
High
VulnerabilityCVE-2023-7329cvecve-2023-7329cwe-306
Published: Wed Nov 12 2025 (11/12/2025, 22:06:26 UTC)
Source: CVE Database V5
Vendor/Project: tinycontrol
Product: Lan Controller

Description

Tinycontrol LAN Controller v3 (LK3) firmware versions up to 1.58a (hardware v3.8) contain a missing authentication vulnerability in the stm.cgi endpoint. A remote, unauthenticated attacker can send crafted requests to forcibly reboot the device or restore factory settings, leading to a denial of service and configuration loss.

AI-Powered Analysis

AILast updated: 11/19/2025, 23:13:44 UTC

Technical Analysis

The vulnerability identified as CVE-2023-7329 affects tinycontrol LAN Controller v3 (hardware version 3.8) firmware versions up to 1.58a. It is classified under CWE-306, indicating missing authentication for a critical function. Specifically, the stm.cgi endpoint in the device's firmware does not enforce any authentication checks, allowing any remote attacker to send specially crafted HTTP requests. These requests can trigger forced device reboots or restore the device to factory default settings. The lack of authentication means no credentials or prior access are required, and no user interaction is necessary, making exploitation straightforward. The impact is primarily denial of service (DoS), as the device becomes unavailable during reboot or loses its configuration, potentially disrupting network management and control functions. The CVSS 4.0 base score is 8.7, reflecting high severity due to network attack vector, no required privileges or user interaction, and a high impact on availability. No patches or fixes are currently linked, and no known exploits have been reported in the wild, but the vulnerability presents a clear risk if targeted. The device is typically used in network environments to manage LAN operations, so disruption can affect broader network stability and security posture.

Potential Impact

For European organizations, this vulnerability can lead to significant operational disruptions, especially in environments where tinycontrol LAN Controllers are integral to network management and automation. Forced reboots or factory resets can cause temporary loss of network control, interrupting business-critical services and potentially leading to downtime. Configuration loss may require manual reconfiguration, increasing administrative overhead and risk of misconfiguration. In sectors such as manufacturing, utilities, or critical infrastructure where LAN Controllers manage automation or monitoring, this could translate into safety risks or compliance violations. Additionally, attackers could leverage this vulnerability as part of a broader attack chain to degrade network reliability or as a denial of service vector against targeted organizations. The absence of authentication and ease of exploitation heighten the risk, particularly if devices are exposed to untrusted networks or insufficiently segmented environments.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately restrict access to tinycontrol LAN Controller management interfaces by implementing strict network segmentation and firewall rules that limit access to trusted hosts only. Deploy VPNs or secure tunnels for remote management to prevent direct exposure of the stm.cgi endpoint to untrusted networks. Monitor network traffic for anomalous HTTP requests targeting the stm.cgi endpoint and set up alerts for repeated reboot or reset commands. Where possible, disable or restrict the use of the vulnerable endpoint if the device firmware allows configuration changes. Engage with the vendor to obtain firmware updates or patches addressing this vulnerability as soon as they become available. Additionally, maintain regular backups of device configurations to enable rapid restoration in case of forced resets. Incorporate this vulnerability into incident response plans to ensure rapid detection and remediation if exploitation is suspected.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-11-12T21:06:12.202Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691509abe6b3e50d509f11c4

Added to database: 11/12/2025, 10:26:51 PM

Last enriched: 11/19/2025, 11:13:44 PM

Last updated: 12/28/2025, 2:44:08 AM

Views: 65

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats